Cited By
View all- Wu JShi QLuo BLiao XXu JKirda ELie D(2024)Poster: Protecting Source Code Privacy When Hunting BugsProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3691407(5030-5032)Online publication date: 2-Dec-2024
- Tan JRigger MChristakis MPradel M(2024)Inconsistencies in TeX-Produced DocumentsProceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis10.1145/3650212.3680370(1415-1427)Online publication date: 11-Sep-2024
- Yin XFeng YShi QLiu ZLiu HXu BChristakis MPradel M(2024)FRIES: Fuzzing Rust Library Interactions via Efficient Ecosystem-Guided Target GenerationProceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis10.1145/3650212.3680348(1137-1148)Online publication date: 11-Sep-2024
- Show More Cited By